First published: Mon Nov 01 2021(Updated: )
Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uyuni | =2021.08 | |
Red Hat Spacewalk | =2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-40348.
The severity of CVE-2021-40348 is critical (8.8).
Spacewalk 2.10 and Uyuni 2021.08 are affected by CVE-2021-40348.
CVE-2021-40348 allows code injection through the un-sanitized configuration filename used by rhn-config-satellite.pl script.
Yes, a fix is available. Please refer to the provided references for more information.